Author of the publication

A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.

, , , , , and . J. Comput. Syst. Sci., 80 (5): 1008-1020 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation., , and . CoRR, (2018)GhostKnight: Breaching Data Integrity via Speculative Execution., , , and . CoRR, (2020)What and With Whom? Identifying Topics in Twitter Through Both Interactions and Text., , , , and . IEEE Trans. Serv. Comput., 13 (3): 584-596 (2020)SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud., , , , , and . Concurr. Comput. Pract. Exp., 25 (18): 2561-2576 (2013)Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs., , , , , , and . IEEE Internet Things J., 9 (14): 12563-12572 (2022)Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs., , , , , and . IEEE Trans. Serv. Comput., 15 (5): 2728-2741 (2022)Scheduling Real-Time Security Aware Tasks in Fog Networks., , , , and . IEEE Trans. Serv. Comput., 14 (6): 1981-1994 (2021)Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability., , , , , and . IEEE Access, (2017)Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm., , , and . IEEE Access, (2021)Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication., , , and . IACR Cryptology ePrint Archive, (2017)